-
1 common password
Безопасность: групповой пароль, общий пароль -
2 common password
общий (групповой) парольАнгло-русский словарь по компьютерной безопасности > common password
-
3 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
4 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
5 COPS
2) Военный термин: Computer Output Processing Service, contingency operations plans report, current operations3) Техника: containment overpressure protection systems4) Юридический термин: Community Oriented Police Services, Community Oriented Policing System5) Бухгалтерия: Computerized Online Payment Service, Cost Of Produced Sales6) Сокращение: Commodity Orientated Procurement System7) Вычислительная техника: система передачи и обработки данных, Common Open Policy Service protocol (RFC 2748)8) Деловая лексика: Catching Other People Succeeding, Courier Order Processing System9) Образование: Capitalization Organization Punctuation Spelling10) Сетевые технологии: Common Open Policy Service11) Океанография: Coastal Ocean Prediction Systems Program12) Безопасность: Computer Oracle And Password System13) Высокочастотная электроника: complex operations per second -
6 cops
2) Военный термин: Computer Output Processing Service, contingency operations plans report, current operations3) Техника: containment overpressure protection systems4) Юридический термин: Community Oriented Police Services, Community Oriented Policing System5) Бухгалтерия: Computerized Online Payment Service, Cost Of Produced Sales6) Сокращение: Commodity Orientated Procurement System7) Вычислительная техника: система передачи и обработки данных, Common Open Policy Service protocol (RFC 2748)8) Деловая лексика: Catching Other People Succeeding, Courier Order Processing System9) Образование: Capitalization Organization Punctuation Spelling10) Сетевые технологии: Common Open Policy Service11) Океанография: Coastal Ocean Prediction Systems Program12) Безопасность: Computer Oracle And Password System13) Высокочастотная электроника: complex operations per second -
7 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
8 protocol
- analog networking protocol - cache coherence protocol
- card isolation protocol - character count protocol - cryptographic protocol
- data compression protocol - digital voice messaging networking protocol - error-correction protocol - interior gateway protocol
- interior gateway routing protocol
- internal message protocol
- Internet protocol
- internet protocol
- Internet control message protocol
- internet control message protocol
- Internet gateway routing protocol - IP multicast protocol - link access protocol-digital
- link access protocol for modems - packetized ensemble protocol
- password authentication protocol
- point to point protocol
- point to point multi-link protocol
- point to point tunneling protocol - routing information protocol
- SCSI interlocked protocol - session protocol
- session initiation protocol - stated protocol
- stateful protocol
- stateless protocol
- synchronous protocol - transmission control protocol - transport protocol
- transport protocol class 0
- transport protocol class 4 -
9 protocol
- analog networking protocol
- AppleTalk remote access protocol
- autonomous virtual network protocol
- bandwidth allocation control protocol
- bit-oriented protocol
- bootstrap protocol
- border gateway protocol
- byte-oriented protocol
- cache coherence protocol
- card isolation protocol
- challenge handshake authentication protocol
- character count protocol
- character-controlled protocol
- character-oriented protocol
- client-to-client protocol
- common management information protocol
- communications protocol
- compressed serial line Internet protocol
- connectionless network layer protocol
- connectionless network protocol
- connectionless protocol
- connectionless transport protocol
- connection-oriented protocol
- cryptographic protocol
- data compression protocol
- data link control protocol
- digital data communication message protocol
- digital networking protocol
- digital voice messaging networking protocol
- directory access protocol
- distance vector multicast routing protocol
- dynamic host configuration protocol
- dynamic serial line Internet protocol
- end system to intermediate system protocol
- error-correction protocol
- extended simple mail transfer protocol
- exterior gateway protocol
- fiber channel protocol
- file transfer protocol
- flexible wide-area protocol
- generic packetized protocol
- hot standby router protocol
- hypertext transfer protocol
- image access protocol
- interior gateway protocol
- interior gateway routing protocol
- internal message protocol
- Internet control message protocol
- internet control message protocol
- Internet gateway routing protocol
- Internet group management protocol
- internet group management protocol
- internet inter-ORB protocol
- Internet mail access protocol
- Internet protocol
- internet protocol
- Internet relay chat protocol
- interworking protocol
- IP multicast protocol
- layer-2 tunneling protocol
- lightweight directory access protocol
- link access protocol for modems
- link access protocol
- link access protocol-balanced
- link access protocol-digital
- link control protocol
- manufacturing automation protocol
- medium access control protocol
- message transport protocol
- Microcom networking protocol
- modulation protocol
- multicast file transfer protocol
- multi-link access protocol-digital
- multiprotocol gateway control protocol
- multi-vendor integration protocol
- NetWare core protocol
- NetWare link service protocol
- network control protocols
- network news transfer protocol
- network service protocol
- network time protocol
- next-hop routing protocol
- nonroutable protocol
- packetized ensemble protocol
- password authentication protocol
- point to point multi-link protocol
- point to point protocol
- point to point tunneling protocol
- post office protocol
- proprietary protocol
- proxy address resolution protocol
- radio link protocol
- random-access protocol
- real-time control protocol
- real-time streaming protocol
- real-time transport protocol
- resource reservation protocol
- reverse address resolution protocol
- Rock Ridge interchange protocol
- routable protocol
- router discovery protocol
- routing information protocol
- routing protocol
- SCSI interlocked protocol
- secure hypertext transfer protocol
- serial bus protocol
- serial line access protocol
- serial line Internet protocol
- service advertising protocol
- session initiation protocol
- session protocol
- simple gateway management protocol
- simple mail transfer protocol
- simple management protocol
- simple network management protocol
- socket protocol
- stated protocol
- stateful protocol
- stateless protocol
- synchronous protocol
- system use shared protocol
- technical/office protocol
- time-triggered protocol
- track protocol
- transmission control protocol Internet protocol
- transmission control protocol over/based on Internet protocol
- transmission control protocol
- transport layer protocol
- transport protocol class 0
- transport protocol class 4
- transport protocol
- upper layer protocol
- user datagram protocol
- voice over Internet protocol
- voice-channel protocol
- wireless application protocolThe New English-Russian Dictionary of Radio-electronics > protocol
См. также в других словарях:
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
Password notification e-mail — is a common technique used by websites. If a user forgets their password then a password notification e mail is sent containing enough information for the user to access their account again. This method of password retrieval relies on the… … Wikipedia
Common Access Card — An example DoD Common Access Card The Common Access Card (CAC) is a United States Department of Defense (DoD) smart card issued as standard identification for active duty military personnel, reserve personnel, civilian employees, other non DoD… … Wikipedia
Password (TV series) — Infobox television show name = Password caption = Password title logo, 1967 format = Game Show runtime = 30 Minutes creator = Bob Stewart, Mark Goodson Bill Todman starring = Allen Ludden country = USA rating=TV G network = CBS (1961 1967), ABC… … Wikipedia
Password policy — A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization s official regulations and may be taught as part… … Wikipedia
Password — Ein Kennwort, auch Passwort (engl.: password), Passphrase, Schlüsselwort, Codewort (auch: Kodewort), Losung, Losungswort oder Parole (von ital.: la parola; deutsch: „das Wort“) genannt, dient zur Authentifizierung und eindeutigen Identifizierung … Deutsch Wikipedia
Common Authentication Service Adapter — CASA is an open source component infrastructure for securely storing credential and other confidential data that can be used for authentication, single sign on (SSO) and other purposes by users, services and applications on a desktop or server… … Wikipedia
Random password generator — A random password generator is software program or hardware device that takes input from a random or pseudo random number generator and automatically generates a password. Random passwords can be generated manually, using simple sources of… … Wikipedia
One-time password — A one time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs … Wikipedia